06.11.2016 Views

WiFi-Based IMSI Catcher

2fs7SrS

2fs7SrS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Department of Computer Science<br />

<strong>WiFi</strong>-<strong>Based</strong> <strong>IMSI</strong> <strong>Catcher</strong><br />

Piers O’Hanlon<br />

Ravishankar Borgaonkar<br />

BlackHat, London, 3 rd November 2016


Overview<br />

• What is an <strong>IMSI</strong>?<br />

• ‘Classic’ <strong>IMSI</strong> <strong>Catcher</strong>s<br />

• <strong>WiFi</strong>-based <strong>IMSI</strong> <strong>Catcher</strong><br />

• <strong>WiFi</strong> Network Authentication


What is an <strong>IMSI</strong>?<br />

• International Mobile Subscriber Identity<br />

• Allows for mutual authentication of a device to the network<br />

• Using SIM’s secret authentication Key (K i ) and for 3/4G the<br />

Sequence Number (SQN)<br />

• Stored in two places:<br />

• In the ‘SIM Card’ (USIM/UICC)<br />

• <strong>IMSI</strong> is accessible in read only section of SIM<br />

• Secret key (K i ) and SQN are not directly readable<br />

• At the Operator<br />

• <strong>IMSI</strong> indexes K i and SQN from HSS/AuC Database<br />

• An identifier that can be used for tracking<br />

• One of a few like <strong>WiFi</strong>/Bluetooth/NFC Hardware address (e.g.<br />

MAC), IMEI, MSISDN (Phone number), etc.


Classic <strong>IMSI</strong> <strong>Catcher</strong>s<br />

• Typical features<br />

• Tracking: <strong>IMSI</strong>/IMEI, Location<br />

• Interception: Call/SMS/Data<br />

• Operates on licensed Mobile Bands: GSM/3G/4G<br />

• Acts as a fake base station to lure nearby mobile devices<br />

• Operates in two modes<br />

• Passive - mainly for tracking (interception when no/weak<br />

ciphering)<br />

• Active – interception and tracking<br />

• Cost<br />

• Commercial solutions expensive - but now possible with<br />

Laptop+SDR board<br />

• Been around since the early 1990s<br />

• Patented in Europe in 1993


Techniques in Classic <strong>IMSI</strong> <strong>Catcher</strong>s<br />

2G<br />

• Exploits protocol flaws (no<br />

mutual authentication..)<br />

• Tracking & Interception<br />

• Easily available to buy online<br />

• Use of fake base station<br />

3G/4G<br />

• Exploits architecture issues<br />

(Base station > UE..)<br />

• Tracking & difficult to intercept<br />

traffic w.r.t 2G<br />

• Commercial products usually<br />

downgrades<br />

• Use of legitimate base station<br />

also possible<br />

http://www.epicos.com/EPCompanyProfileWeb/Content/Ability/EM_GSM.JPG<br />

http://edge.alluremedia.com.au/m/g/2016/05/nokia_ultra_compact_network.jpg


Protection against <strong>IMSI</strong> <strong>Catcher</strong>s<br />

• No protection for commercial non-rooted<br />

mobile devices<br />

• Special phones (expensive though) and apps for<br />

rooted phones<br />

• Turn off cellular connection or use <strong>WiFi</strong> platform<br />

for secure calls/data??


<strong>WiFi</strong>-<strong>Based</strong> <strong>IMSI</strong> <strong>Catcher</strong><br />

• Features<br />

• Tracking: <strong>IMSI</strong>, Location<br />

• No interception (yet)<br />

• Operates in ISM Bands: <strong>WiFi</strong><br />

• Fake Access Points<br />

• Redirect/Spoofs mobile packet data gateway<br />

• Exploits protocol & configuration weaknesses<br />

• <strong>Based</strong> on two separate techniques [3GPP TS33.234]<br />

• <strong>WiFi</strong> Network Authentication (‘WLAN direct IP access’)<br />

• <strong>WiFi</strong>-Calling Authentication (‘WLAN 3GPP IP access’)<br />

• Cost<br />

• Low: Virtually any <strong>WiFi</strong> capable computer


<strong>WiFi</strong> Network attachment<br />

• Traditional Encrypted <strong>WiFi</strong> access points<br />

• Pre-shared password<br />

• Traditional unencrypted <strong>WiFi</strong> access points<br />

• Captive Portal<br />

• WiSPr <strong>Based</strong><br />

• DNS/HTTP/IP redirects etc<br />

• ‘Auto Connect’/802.1X Encrypted <strong>WiFi</strong> access points<br />

• Key is negotiated without user intervention<br />

• <strong>Based</strong> on credentials in the USIM/UICC (‘SIM Card’)<br />

• Controlled by operator provided configuration<br />

• Manual<br />

• Automatic/pre-installed<br />

• iOS includes pre-installed operator mobileconfig profiles


Automatic configuration<br />

• iOS configures phone based on inserted SIM<br />

• Activates an operator specific .mobileconfig file<br />

• Configures a range of operator specific options<br />

• Including a list of Auto/EAP supported <strong>WiFi</strong> SSIDs<br />

• Our analysis of iOS9 profiles showed<br />

• More than 50 profiles for Auto/EAP <strong>WiFi</strong><br />

• Also some other curiosities<br />

• E.g. Hardcoded passwords, Certificates, etc


‘Manual’ Configuration<br />

• Android requires initial manual configuration<br />

• After which it automatically connects<br />

• Instructions on operator websites<br />

• Follow simple steps to set up<br />

• Android provides various Carrier controlled<br />

mechanisms<br />

• Lollipop (v5.1 MR1): UICC Carrier Privileges<br />

• Marshmallow (v6.0): Carrier Configuration<br />

• “Privileged applications to provide carrier-specific<br />

configuration to the platform”<br />

• So Android may be automatic soon…if not already.


Automatic <strong>WiFi</strong> Authentication<br />

• Port <strong>Based</strong> Network Access Control [IEEE 802.1X]<br />

• Uses Extensible Authentication Protocol (EAP) [RFC3748]<br />

over LAN (EAPOL) over <strong>WiFi</strong><br />

• <strong>Based</strong> upon two EAP Methods<br />

• EAP-SIM [RFC 4186]<br />

• GSM based security - Currently most widely used<br />

• EAP-AKA [RFC 4187]<br />

• 3G based security - Being deployed<br />

• Support in Android, iOS, Windows Mobile, and<br />

Blackberry devices<br />

• We’ve reported the issue to them all and to operators<br />

• No privacy bounties


EAP-SIM/AKA Identities<br />

• Three basic identity types for authentication<br />

• Permanent-identity (<strong>IMSI</strong>)<br />

• Typically used initially after which temporary ids are used<br />

• Pseudonym identity<br />

• A pseudonym for the <strong>IMSI</strong><br />

• Fast reauthentication-identity<br />

• Lower overhead re-attachment after initial exchange<br />

• Behaviour affected by peer policy<br />

• “Liberal” peer - Current default<br />

• Responds to any requests for permanent identity<br />

• “Conservative” peer – Being deployed<br />

• Only respond to requests for permanent identity when no<br />

Pseudonym identity available


EAP-SIM/AKA transport<br />

• Basic EAP is sent unencrypted<br />

• Currently EAP-SIM/AKA is not encrypted<br />

• Thus <strong>IMSI</strong> is visible (to a passive attacker) when<br />

permanent identity used for full authentication


<strong>WiFi</strong>-Calling Authentication<br />

• Phone connects to Edge Packet Data Gateway (EPDG)<br />

over <strong>WiFi</strong><br />

• Voice calls over <strong>WiFi</strong><br />

• Phone connects on low/no signal<br />

• Also connects in Airplane mode…<br />

• Connection to EPDG uses IPsec<br />

• Authenticates using Internet Key Exchange Protocol (IKEv2)<br />

• Supported on iOS and Android devices (maybe<br />

others?)<br />

• <strong>WiFi</strong>-Calling available in a number of countries<br />

• The issue has been reported to OS makers and Operators


IPsec brief overview<br />

• Internet Protocol Security<br />

• Confidentiality, data integrity, access control, and data source<br />

authentication<br />

• Recovery from transmission errors: packet loss, packet replay, and<br />

packet forgery<br />

• Authentication<br />

• Authentication Header (AH) - RFC 4302<br />

• Confidentiality<br />

• Encapsulating Security Payload (ESP) - RFC 4303<br />

• Key management<br />

• Internet Key Exchange v2 (IKEv2) - RFC7296<br />

• Two modes<br />

• Tunnel - used for connection to Gateway (EPDG)<br />

• Transport


Internet Key Exchange (IKEv2)<br />

• Initiates connection in two phases<br />

• IKE_SA_INIT<br />

• Negotiate cryptographic algorithms, exchange nonces, and do<br />

a Diffie-Hellman exchange<br />

• IKE_AUTH<br />

• Authenticate the previous messages, exchange identities (e.g.<br />

<strong>IMSI</strong>), and certificates, and establish the child Security<br />

Association(s) (SA)<br />

• IKE_AUTH uses EAP-AKA<br />

• Not protected by a certificate<br />

• Open to MitM attacks on identity (<strong>IMSI</strong>)


Operator Mitigations<br />

• Deprecate EAP-SIM in favour of EAP-AKA<br />

• EAP-SIM is weaker as it only uses GSM triplets<br />

• Deploy EAP-AKA with conservative peer pseudonym support<br />

• Support emerging in some OSes<br />

• Certificate based approach<br />

• Mobile OSes need full support for EAP-TTLv0 + EAP-AKA in IKEv2 & EAPOL<br />

• Deploy certificates on suitable AAA infrastructure<br />

• Deploy certificated protected tunnelled EAP-AKA for WLAN access<br />

• E.g. EAP-TTLS+EAP-AKA on 802.1X<br />

• Deploy certificate protected IPsec/IKEv2 to EPDG<br />

• E.g. EAP-TTLS+EAP-AKA for IKE_AUTH, or multiple IKEv2 auth exchange<br />

• Allow for more user choice with automatic <strong>WiFi</strong> network access<br />

• (Re)investigate other potential solutions<br />

• <strong>IMSI</strong> encryption – 5G-ENSURE project has proposed an ‘enabler’<br />

• E.g. 3GPPP TD S3-030081 – ‘Certificate-<strong>Based</strong> Protection of <strong>IMSI</strong> for EAP-<br />

SIM/AKA’<br />

• Lower impact wrt operator certificate deployment


User Mitigation<br />

• <strong>WiFi</strong> Network Access Control<br />

• iOS<br />

• Turn off ‘Auto-Join’ toggle for Auto-<strong>WiFi</strong> networks<br />

• Only possible when network in range<br />

• iOS10 may provide better protection (once operators deploy<br />

support)<br />

• It has conservative peer pseudonym support – due to us


Conclusions & Future Work<br />

• Investigating other uses of EAP-SIM/AKA<br />

• Exploring use of USIM credentials in other <strong>WiFi</strong><br />

based protocols<br />

• Continuing work in 5GENSURE.EU Project<br />

• Security Architecture and enablers

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!